Cyber Week5 - MLS,CovertChannels,PowerAttacks

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:48 PM on 1/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

42 Terms

1
New cards
What is the primary characteristic of Discretionary Access Control (DAC)
The user determines who is given access to objects they own
2
New cards
What is a major vulnerability of DAC systems regarding program behavior
DAC does not provide protection against Trojan Horses
3
New cards
How does Mandatory Access Control (MAC) differ from DAC
The system assigns security attributes to subjects and objects which cannot be changed on request
4
New cards
What is MLS and which kind of Access Control is it likely to use?
Multi-Layer Security is a security policy based on classifications, commonly used in highly assured networks e.g. Government. Uses Mandatory Access Control.
5
New cards
What is classification in the context of MLS
A hierarchical set of markings indicating levels of sensitivity like Top Secret or Secret
6
New cards

What does the ‘dominates’ relation signify

It means a classification is “at least as sensitive” as another

7
New cards
Name the three mathematical properties of the dominates relation

Reflexive (each classification dominates itself)

Asymmetric (different classifications cannot both dominate the other)

Transitive (If A > B and B > C, then A > C)

8
New cards

In MLS what is classification and clearance

Objects are assigned a classification indicating the sensitivity of their data.

Subjects are assigned a clearance - a classification which indicates the most sensitive data they can read/write.

9
New cards
State the Bell-La Padula No Read-Up Rule
A subject may only read an object if the subject clearance dominates the object classification
A subject may only read an object if the subject clearance dominates the object classification
10
New cards

Why is the No Read-Up rule not enough to provide security on its own?

A user may read contents of a secret file and copy them to an Unclassified file

11
New cards
State the Bell-La Padula No Write-Down Rule (star-property)
A subject may only write to an object if the object classification dominates the subject clearance
A subject may only write to an object if the object classification dominates the subject clearance
12
New cards
What is the purpose of a current clearance
To allow a subject to operate at a lower sensitivity level than its maximum clearance to avoid overly restrictive write-rules
13
New cards
What is a covert channel
An unusual means of communication that allows information to leak in violation of mandatory security policy
14
New cards
Define a covert storage channel
A channel where the values returned to a receiver by system operations are modulated to convey data
15
New cards
Define a covert timing channel
A channel where the time at which events are perceived by a receiver is modulated to convey data
16
New cards
How can the existence of a file be used as a covert channel
A high-level subject creates or deletes a file and a low-level subject tries to create the same file to see if it already exists
17
New cards
How can object attributes like Time Last Read be used covertly
A high-level subject reads a file which updates its metadata and a low-level subject monitors that metadata for changes
18
New cards
What is the security risk of downgrading an object
It allows a user to reclassify sensitive information (e.g. Top Secret) to a lower level (e.g. Unclassified)
19
New cards
Explain a timing channel using a disk head
A sender moves the disk head to a specific radius and the receiver measures the time taken for its own disk access to infer the sender bit
20
New cards
What is a system clock in the context of covert channels
A means for a receiver to measure the passage of relative time to interpret timing signals
21
New cards
What is the Goguen and Meseguer non-interference model
The principle that actions by high-level subjects should not be visible to or affect lower-level subjects
22
New cards
List two ways information can be covertly channeled in distributed systems
By modulating message lengths or the timing of messages
23
New cards
Why might overwriting a file with zeros not be enough for security
Finer physical analysis like scanning force microscopy may reveal traces of the previous data history
24
New cards
How can signal amplitude be used for a covert channel
By using small voltage excesses over the reference values (e.g. 0.1V above 5V) to signal hidden bits
25
New cards
What does it mean to slug a covert channel
To increase the time taken to complete actions to reduce the channel bandwidth and make it less useful
26
New cards
What are caveats and codewords in MLS
Additional markings used to restrict information to specific groups or reflect a need to know
27
New cards
What mathematical structure is formed by compound security classes
A lattice
28
New cards
In a lattice what is the Least Upper Bound (LUB)
A unique security class that dominates two given classes
29
New cards
What is Biba's model used for
Maintaining system integrity by preventing low-integrity subjects from writing to high-integrity data
30
New cards
What is the dual of secrecy in the Biba model
Integrity
31
New cards
What is the core premise of a Power Attack
Monitoring power consumption of a hardware implementation can reveal secret key information
32
New cards
Define Simple Power Analysis (SPA)
An attack that involves directly observing power traces to identify executed instructions or key bits
33
New cards
Define Differential Power Analysis (DPA)
An attack that uses statistical correlations across many executions to extract secret keys
34
New cards
How can SPA reveal the DES algorithm's execution
The 16 rounds of DES encryption show up as visible power consumption profiles over time
35
New cards
How can SPA reveal a secret key via conditional branches
If an algorithm executes different instructions based on a 0 or 1 key bit the power profile will change
36
New cards
Name one way to defend against SPA
Avoid conditional branching or generate noise to mask the power profile
37
New cards
What is the first step in a DPA attack
Guessing a portion of the sub-key bits (e.g. for a DES S-box)
38
New cards
What is a predictor in a DPA attack
A function used to predict a specific bit value in the calculation based on a key guess and ciphertext
39
New cards
How does the DPA predictor act as a partitioner
It splits power traces into two groups based on whether the predicted bit is 0 or 1
40
New cards
In DPA what happens to the power average if a key guess is wrong
The difference between the two partitioned groups will be very small or near zero
41
New cards
In DPA what happens if a key guess is correct
A correlation spike appears because the two groups have different power consumption averages
42
New cards
Why are power attacks considered side-channel attacks
Because they exploit physical information leaked by the hardware rather than flaws in the math of the algorithm

Explore top flashcards

Acrow
Updated 432d ago
flashcards Flashcards (29)
PSY 3113 Chapter 1
Updated 848d ago
flashcards Flashcards (60)
Psychosocial Midterm
Updated 956d ago
flashcards Flashcards (123)
Author Test Sets 1-6
Updated 1034d ago
flashcards Flashcards (135)
Biology Lab Final
Updated 660d ago
flashcards Flashcards (91)
Ecology
Updated 1103d ago
flashcards Flashcards (49)
Acrow
Updated 432d ago
flashcards Flashcards (29)
PSY 3113 Chapter 1
Updated 848d ago
flashcards Flashcards (60)
Psychosocial Midterm
Updated 956d ago
flashcards Flashcards (123)
Author Test Sets 1-6
Updated 1034d ago
flashcards Flashcards (135)
Biology Lab Final
Updated 660d ago
flashcards Flashcards (91)
Ecology
Updated 1103d ago
flashcards Flashcards (49)